- Adapt Forward (North Charleston, SC)
- Cyber Security Analyst III, Detection Engineer Cloud SME North Charleston, SC Secret Required to Start, TS SCI Required As a Detection Engineer Cloud SME you will be ... (DCO) Watch Analysts and other teams to ensure timely and effective threat detection, adhering to CJCSM 6510.01B reporting requirements and supporting the CSSP's… more
- Tyto Athene (Ashburn, VA)
- …VA. In this role, you will work closely with threat hunters, threat analysts, and an established SOC -playing a critical part in identifying, assessing, ... tools and technologies used for vulnerability testing, scanning, and threat identification. + Review and update vulnerability management plans,...IAT Level II or IAM Level I or CSSP Analyst / Incident Responder + GCFA -… more
- New York State Civil Service (Latham, NY)
- …Services\Chief Information Security Office\NYSOC, the incumbent will be a Tier 0 Analyst working in the New York Security Operations Center (NYSOC) participating in ... of security events for NYSOC subscribers. The incumbent will leverage a variety of threat intelligence sources and indicators of compromise (IOCs) to perform SOC … more
- Robert Half Technology (Tampa, FL)
- …identity, and SaaS platforms. * Conduct vulnerability assessments, penetration testing, threat modeling, and security code reviews for web applications. * Manage ... the incident response lifecycle, including detection, triage, containment, recovery, and...enhance security tools and systems such as identity management, threat detection, and compliance monitoring. * Strengthen access controls… more
- Chenega Corporation (Washington, DC)
- …investigation, reporting, and resuming steady state operations), to include crisis incident management + Threat intelligence production, collection, analysis, ... event and alert monitoring, intelligence research and analysis, and event, and incident management. + Responsible for the overall development of workflows ,… more
- Leidos (Whitehall, OH)
- …security elements for effective threat detection, analysis, and mitigation as a SOC Security Analyst . + Bachelor's degree and 8+ years of relevant ... oversees the Defensive Cyber Operations across three sites encompassing cyber threat intelligence analysis, correlation of actionable security events, and network… more
- System One (Huntsville, AL)
- …and/or certifications: + GIAC Continuous Monitoring Certification (GMON) + GIAC Certified Incident Handler (GCIH) + GIAC Certified Forensic Analyst (GCFA) + ... join our high-performing cyber team in support of a large SOC enterprise environment. RESPONSIBILITIES: Possesses professional experience related to cyber intrusions… more
- LA Care Health Plan (Los Angeles, CA)
- …the CDOC team providing real-time, continuous Cybersecurity monitoring and triage, incident analysis, and coordination and response. The CDOC Manager will act ... the technical expert in multiple domains to coordinate CDOC efforts during incident and breach responses. Collaborates with other Information Security (InfoSec) and… more
- Cisco (Seattle, WA)
- …on the Splunk platform. + **Security Operations Background** - Former Tier 3 SOC analyst or equivalent, with experience automating SecOps workflows and building ... agentic workflows** that combine detection signals, context, and playbooks to automate threat triage and response. + **Prototype and test new AI features** -from… more